CAF Outcome B3.a: Understanding Data
From the UK NCSC's Cyber Assessment Framework (version 3.1):
You have a good understanding of data important to the operation of the essential function, where it is stored, where it travels and how unavailability or unauthorised access, modification or deletion would adversely impact the essential function. This also applies to third parties storing or accessing data important to the operation of essential functions.
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
NCSC CAF Mapped to NIST CSF
B3.a: Understanding Data to CSF mappings generated from UK Cabinet Office table.
Related ISA/IEC 62443 Controls
Clauses and controls from IEC 62443 (62443-2-1 and 62443-3-3) which are related to this CAF outcome, taken from mappings by Ofgem.
-
Maintain information classifications (4.3.4.4.6)
ISA/IEC 62443-2-1:2009
Related ISO 27001 Controls
Clauses and controls from ISO 27001 (2013) which are related to this CAF outcome, taken from mappings by Ofgem.
-
Capacity management (12.1.3)
ISO 27001:2013 -
Protecting application services transactions (14.1.3)
ISO 27001:2013 -
Classification of information (8.2.1)
ISO 27001:2013 -
Inventory of assets (8.1.1)
ISO 27001:2013
Related SP800-53 Controls
Generated from NISTs SP800-53/CSF Crosswalk mappings.